COMPLIANCE VIOLATION DETECTION

Non-limiting examples of the present disclosure describe systems and methods for scanning of data for policy compliance. In one example, network data is evaluated to generate one or more groupings. Agrouping may be based on file type of the network data. Data identification rules are applied to iden...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SOL ALISSON, AKSIONKIN MICHAEL, ASIPOV BORIS, GUHA SAIKAT, BARADI RITHESH, SHETH LEENA JAIN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator SOL ALISSON
AKSIONKIN MICHAEL
ASIPOV BORIS
GUHA SAIKAT
BARADI RITHESH
SHETH LEENA JAIN
description Non-limiting examples of the present disclosure describe systems and methods for scanning of data for policy compliance. In one example, network data is evaluated to generate one or more groupings. Agrouping may be based on file type of the network data. Data identification rules are applied to identify one or more data schemas from file data of a grouping. One or more policy rules that apply tocontent of the data schema may be determined. At least one file of the file data may be scanned to determine compliance with the one or more policy rules. A report of compliance with the one or more policy rules may be generated based on a result of a file scan. Other examples are also described. 本公开的非限制性示例描述用于针对策略遵从性而扫描数据的系统和方法。在个示例中,网络数据被评价以生成个或多个分组。分组可以基于网络数据的文件类型。数据标识规则被应用以标识来自分组的文件数据的种或多种数据架构。应用到数据架构的内容的个或多个策略规则可以被确定。文件数据的至少个文件可以被扫描以确定与个或多个策略规则的遵从性。与个或多个策略规则的遵从性的报告可以基于文件扫描的结果而生成。其他示例也被描述。
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN109479061A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN109479061A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN109479061A3</originalsourceid><addsrcrecordid>eNrjZJBz9vcN8PF09HN2VQjz9PdxDPH091NwcQ1xdQaxeBhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJvLOfoYGlibmlgZmhozExagC_cyF-</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>COMPLIANCE VIOLATION DETECTION</title><source>esp@cenet</source><creator>SOL ALISSON ; AKSIONKIN MICHAEL ; ASIPOV BORIS ; GUHA SAIKAT ; BARADI RITHESH ; SHETH LEENA JAIN</creator><creatorcontrib>SOL ALISSON ; AKSIONKIN MICHAEL ; ASIPOV BORIS ; GUHA SAIKAT ; BARADI RITHESH ; SHETH LEENA JAIN</creatorcontrib><description>Non-limiting examples of the present disclosure describe systems and methods for scanning of data for policy compliance. In one example, network data is evaluated to generate one or more groupings. Agrouping may be based on file type of the network data. Data identification rules are applied to identify one or more data schemas from file data of a grouping. One or more policy rules that apply tocontent of the data schema may be determined. At least one file of the file data may be scanned to determine compliance with the one or more policy rules. A report of compliance with the one or more policy rules may be generated based on a result of a file scan. Other examples are also described. 本公开的非限制性示例描述用于针对策略遵从性而扫描数据的系统和方法。在个示例中,网络数据被评价以生成个或多个分组。分组可以基于网络数据的文件类型。数据标识规则被应用以标识来自分组的文件数据的种或多种数据架构。应用到数据架构的内容的个或多个策略规则可以被确定。文件数据的至少个文件可以被扫描以确定与个或多个策略规则的遵从性。与个或多个策略规则的遵从性的报告可以基于文件扫描的结果而生成。其他示例也被描述。</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190315&amp;DB=EPODOC&amp;CC=CN&amp;NR=109479061A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190315&amp;DB=EPODOC&amp;CC=CN&amp;NR=109479061A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SOL ALISSON</creatorcontrib><creatorcontrib>AKSIONKIN MICHAEL</creatorcontrib><creatorcontrib>ASIPOV BORIS</creatorcontrib><creatorcontrib>GUHA SAIKAT</creatorcontrib><creatorcontrib>BARADI RITHESH</creatorcontrib><creatorcontrib>SHETH LEENA JAIN</creatorcontrib><title>COMPLIANCE VIOLATION DETECTION</title><description>Non-limiting examples of the present disclosure describe systems and methods for scanning of data for policy compliance. In one example, network data is evaluated to generate one or more groupings. Agrouping may be based on file type of the network data. Data identification rules are applied to identify one or more data schemas from file data of a grouping. One or more policy rules that apply tocontent of the data schema may be determined. At least one file of the file data may be scanned to determine compliance with the one or more policy rules. A report of compliance with the one or more policy rules may be generated based on a result of a file scan. Other examples are also described. 本公开的非限制性示例描述用于针对策略遵从性而扫描数据的系统和方法。在个示例中,网络数据被评价以生成个或多个分组。分组可以基于网络数据的文件类型。数据标识规则被应用以标识来自分组的文件数据的种或多种数据架构。应用到数据架构的内容的个或多个策略规则可以被确定。文件数据的至少个文件可以被扫描以确定与个或多个策略规则的遵从性。与个或多个策略规则的遵从性的报告可以基于文件扫描的结果而生成。其他示例也被描述。</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJBz9vcN8PF09HN2VQjz9PdxDPH091NwcQ1xdQaxeBhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJvLOfoYGlibmlgZmhozExagC_cyF-</recordid><startdate>20190315</startdate><enddate>20190315</enddate><creator>SOL ALISSON</creator><creator>AKSIONKIN MICHAEL</creator><creator>ASIPOV BORIS</creator><creator>GUHA SAIKAT</creator><creator>BARADI RITHESH</creator><creator>SHETH LEENA JAIN</creator><scope>EVB</scope></search><sort><creationdate>20190315</creationdate><title>COMPLIANCE VIOLATION DETECTION</title><author>SOL ALISSON ; AKSIONKIN MICHAEL ; ASIPOV BORIS ; GUHA SAIKAT ; BARADI RITHESH ; SHETH LEENA JAIN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN109479061A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2019</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>SOL ALISSON</creatorcontrib><creatorcontrib>AKSIONKIN MICHAEL</creatorcontrib><creatorcontrib>ASIPOV BORIS</creatorcontrib><creatorcontrib>GUHA SAIKAT</creatorcontrib><creatorcontrib>BARADI RITHESH</creatorcontrib><creatorcontrib>SHETH LEENA JAIN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SOL ALISSON</au><au>AKSIONKIN MICHAEL</au><au>ASIPOV BORIS</au><au>GUHA SAIKAT</au><au>BARADI RITHESH</au><au>SHETH LEENA JAIN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>COMPLIANCE VIOLATION DETECTION</title><date>2019-03-15</date><risdate>2019</risdate><abstract>Non-limiting examples of the present disclosure describe systems and methods for scanning of data for policy compliance. In one example, network data is evaluated to generate one or more groupings. Agrouping may be based on file type of the network data. Data identification rules are applied to identify one or more data schemas from file data of a grouping. One or more policy rules that apply tocontent of the data schema may be determined. At least one file of the file data may be scanned to determine compliance with the one or more policy rules. A report of compliance with the one or more policy rules may be generated based on a result of a file scan. Other examples are also described. 本公开的非限制性示例描述用于针对策略遵从性而扫描数据的系统和方法。在个示例中,网络数据被评价以生成个或多个分组。分组可以基于网络数据的文件类型。数据标识规则被应用以标识来自分组的文件数据的种或多种数据架构。应用到数据架构的内容的个或多个策略规则可以被确定。文件数据的至少个文件可以被扫描以确定与个或多个策略规则的遵从性。与个或多个策略规则的遵从性的报告可以基于文件扫描的结果而生成。其他示例也被描述。</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN109479061A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title COMPLIANCE VIOLATION DETECTION
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T19%3A55%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SOL%20ALISSON&rft.date=2019-03-15&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN109479061A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true